Category: InfoSec

“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to simulate conversation with human users over the Internet. Chatbots are software agents that interact with the user in a communication. A chatbot is a service which is provided by websites so that users can easily able…

Information security, often referred to as InfoSec, is a set of strategies to protect sensitive business information from unauthorised use, modification, disruption, destruction, recording or inspection. InfoSec does not only protect information in transit but also at rest in storage. InfoSec programs are built around the core objectives of the CIA triad and its primary…

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are plenty of articles on this subject. Instead, we will focus on how to reliably detect and exploit these issues. For this task, all we need to know is that the vulnerability depends on how Java…

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company. The service is offered primarily through web-based apps. Mega mobile apps are also available for Windows Phone, Android and iOS. Mega is known for its security feature where all files are end-to-end encrypted locally before…

Introduction A previously unknown zero-day vulnerability has been disclosed in the Microsoft’s Windows operating system that could help a local user or malicious program to obtain system privileges on the targeted machine. The vulnerability is a privilege escalation issue which resides in the Windows’ task scheduler program and occurred due to errors in the handling…

Recent Posts

Varutra Gallery

About KALP@Varutra

KALP@Varutra is dedicated to perform research, development and build innovation around security of existing/new technologies. It has been introduced with a vision of improvising on new research ideas, threats detection, tools and methodologies to contribute to the information security world.